Vulnerability from csaf_opensuse
Published
2021-09-15 14:35
Modified
2021-09-15 14:35
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115). - CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117) - CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172). - CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025). - CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883). - CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832 ). - CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706). - CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399). - CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400). - CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262). - CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298). - CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292). - CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291). - CVE-2021-3640: A Use-After-Free vulnerability in function sco_sock_sendmsg() was fixed (bnc#1188172). - CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983). - CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985). The following non-security bugs were fixed: - ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes). - ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543) - ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543) - ACPI: processor: Export function to claim _CST control (bsc#1175543) - ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543) - ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543) - Add alt-commit for a BT fix patch (git-fixes) - ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes). - ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes). - ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes). - ALSA: hda/realtek: Workaround for conflicting SSID on ASUS ROG Strix G17 (git-fixes). - ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes). - ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes). - ALSA: usb-audio: Add registration quirk for JBL Quantum 800 (git-fixes). - ALSA: usb-audio: fix incorrect clock source setting (git-fixes). - ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes). - ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes). - ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes). - ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes). - ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes). - ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes). - ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes). - ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes). - ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes). - ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes). - ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes). - ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes). - ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes). - ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes). - ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes). - ASoC: xilinx: Fix reference to PCM buffer address (git-fixes). - ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes). - ath9k: Clear key cache explicitly on disabling hardware (git-fixes). - ath: Use safer key clearing with key cache entries (git-fixes). - bcma: Fix memory leak for internally-handled cores (git-fixes). - bdi: Do not use freezable workqueue (bsc#1189573). - blk-cgroup-kABI-fixes-for-new-fc_app_id-definition.patch - blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507). - blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506). - blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503). - blk-wbt: make sure throttle is enabled properly (bsc#1189504). - block: fix trace completion for chained bio (bsc#1189505). - Bluetooth: add timeout sanity check to hci_inquiry (git-fixes). - Bluetooth: fix repeated calls to sco_sock_kill (git-fixes). - Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes). - Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes). - Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes). - brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes). - btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481). - btrfs: add a comment explaining the data flush steps (bsc#1135481). - btrfs: add a trace class for dumping the current ENOSPC state (bsc#1135481). - btrfs: add a trace point for reserve tickets (bsc#1135481). - btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481). - btrfs: add flushing states for handling data reservations (bsc#1135481). - btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481). - btrfs: adjust the flush trace point to include the source (bsc#1135481). - btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481). - btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481). - btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481). - btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481). - btrfs: check reclaim_size in need_preemptive_reclaim (bsc#1135481). - btrfs: check tickets after waiting on ordered extents (bsc#1135481). - btrfs: do async reclaim for data reservations (bsc#1135481). - btrfs: do not force commit if we are data (bsc#1135481). - btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481). - btrfs: fix btrfs_calc_reclaim_metadata_size calculation (bsc#1135481). - btrfs: fix possible infinite loop in data async reclaim (bsc#1135481). - btrfs: flush delayed refs when trying to reserve data space (bsc#1135481). - btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481). - btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481). - btrfs: implement space clamping for preemptive flushing (bsc#1135481). - btrfs: improve preemptive background space flushing (bsc#1135481). - btrfs: introduce a FORCE_COMMIT_TRANS flush operation (bsc#1135481). - btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481). - btrfs: make flush_space take a enum btrfs_flush_state instead of int (bsc#1135481). - btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481). - btrfs: remove FLUSH_DELAYED_REFS from data ENOSPC flushing (bsc#1135481). - btrfs: remove orig from shrink_delalloc (bsc#1135481). - btrfs: rename need_do_async_reclaim (bsc#1135481). - btrfs: rework btrfs_calc_reclaim_metadata_size (bsc#1135481). - btrfs: rip out btrfs_space_info::total_bytes_pinned (bsc#1135481). - btrfs: rip out may_commit_transaction (bsc#1135481). - btrfs: rip the first_ticket_bytes logic from fail_all_tickets (bsc#1135481). - btrfs: run delayed iputs before committing the transaction for data (bsc#1135481). - btrfs: serialize data reservations if we are flushing (bsc#1135481). - btrfs: shrink delalloc pages instead of full inodes (bsc#1135481). - btrfs: simplify the logic in need_preemptive_flushing (bsc#1135481). - btrfs: tracepoints: convert flush states to using EM macros (bsc#1135481). - btrfs: tracepoints: fix btrfs_trigger_flush symbolic string for flags (bsc#1135481). - btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481). - btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481). - btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481). - btrfs: use the same helper for data and metadata reservations (bsc#1135481). - btrfs: use ticketing for data space reservations (bsc#1135481). - can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes). - ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468). - ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468). - ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427). - cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181). - cgroup: verify that source is a string (bsc#1190131). - clk: kirkwood: Fix a clocking boot regression (git-fixes). - cpuidle: Allow idle states to be disabled by default (bsc#1175543) - cpuidle: Consolidate disabled state checks (bsc#1175543) - cpuidle: cpuidle_state kABI fix (bsc#1175543) - cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543) - cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543) - cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543) - crypto: ccp - Annotate SEV Firmware file names (bsc#1189212). - crypto: qat - use proper type for vf_mask (git-fixes). - crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes). - dmaengine: acpi: Avoid comparison GSI with Linux vIRQ (git-fixes). - dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes). - dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes). - dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes). - dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes). - dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes). - dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes). - dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes). - dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes). - Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543) - drivers/block/null_blk/main: Fix a double free in null_init (git-fixes). - drm/amdgpu/acp: Make PM domain really work (git-fixes). - drm: Copy drm_wait_vblank to user before returning (git-fixes). - drm/msi/mdp4: populate priv->kms in mdp4_kms_init (git-fixes). - drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes). - drm/msm/dsi: Fix some reference counted resource leaks (git-fixes). - drm/nouveau/disp: power down unused DP links during init (git-fixes). - drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes). - drm/panfrost: Simplify lock_region calculation (git-fixes). - ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568). - ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564). - ext4: fix avefreec in find_group_orlov (bsc#1189566). - ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562). - ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576). - ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565). - ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563). - ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567). - fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574). - firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes). - firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes). - Fix breakage of swap over NFS (bsc#1188924). - Fix kabi of prepare_to_wait_exclusive() (bsc#1189575). - fixup 'rpm: support gz and zst compression methods' - fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes). - fpga: xiilnx-spi: Address warning about unused variable (git-fixes). - fpga: zynqmp-fpga: Address warning about unused variable (git-fixes). - gpio: eic-sprd: break loop when getting NULL device resource (git-fixes). - gpio: mpc8xxx: Fix a resources leak in the error handling path of 'mpc8xxx_probe()' (git-fixes). - gpu: ipu-v3: Fix i.MX IPU-v3 offset calculations for (semi)planar U/V formats (git-fixes). - HID: i2c-hid: Fix Elan touchpad regression (git-fixes). - HID: input: do not report stylus battery state as 'full' (git-fixes). - i2c: dev: zero out array used for i2c reads from userspace (git-fixes). - i2c: highlander: add IRQ check (git-fixes). - i2c: iop3xx: fix deferred probing (git-fixes). - i2c: mt65xx: fix IRQ check (git-fixes). - i2c: s3c2410: fix IRQ check (git-fixes). - iio: adc: Fix incorrect exit of for-loop (git-fixes). - iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes). - iio: humidity: hdc100x: Add margin to the conversion time (git-fixes). - intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543) - intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543) - intel_idle: Annotate init time data structures (bsc#1175543) - intel_idle: Customize IceLake server support (bsc#1175543) - intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141) - intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543) - intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543) - intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543) - intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543) - intel_idle: Use ACPI _CST on server systems (bsc#1175543) - iommu/amd: Fix extended features logging (bsc#1189213). - iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209). - iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210). - iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229). - iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214). - iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215). - iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216). - iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217). - iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218). - iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219). - iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220). - iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221). - iommu/vt-d: Reject unsupported page request modes (bsc#1189222). - ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115). - iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes). - kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924). - kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes). - kABI fix of usb_dcd_config_params (git-fixes). - kernel-binary.spec: Define $image as rpm macro (bsc#1189841). - kernel-cert-subpackage: Fix certificate location in scriptlets (bsc#1189841). - kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153). - leds: trigger: audio: Add an activate callback to ensure the initial brightness is set (git-fixes). - libata: add ATA_HORKAGE_NO_NCQ_TRIM for Samsung 860 and 870 SSDs (git-fixes). - libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes). - lib/mpi: use kcalloc in mpi_resize (git-fixes). - lockd: Fix invalid lockowner cast after vfs_test_lock (git-fixes). - mac80211: Fix insufficient headroom issue for AMSDU (git-fixes). - mailbox: sti: quieten kernel-doc warnings (git-fixes). - md/raid10: properly indicate failure when ending a failed write request (git-fixes). - media: cxd2880-spi: Fix an error handling path (git-fixes). - media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes). - media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes). - media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes). - media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes). - media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes). - media: go7007: fix memory leak in go7007_usb_probe (git-fixes). - media: go7007: remove redundant initialization (git-fixes). - media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes). - media: TDA1997x: enable EDID support (git-fixes). - media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes). - media: zr364xx: fix memory leaks in probe() (git-fixes). - media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes). - memcg: enable accounting for file lock caches (bsc#1190115). - mfd: axp20x: Update AXP288 volatile ranges (git-fixes). - mfd: lpc_sch: Rename GPIOBASE to prevent build error (git-fixes). - mfd: tqmx86: Clear GPIO IRQ resource when no IRQ is set (git-fixes). - misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes). - misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes). - mmc: dw_mmc: Fix hang on data CRC error (git-fixes). - mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes). - mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes). - mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes). - mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes). - mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619). - mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569). - mm/vmscan: fix infinite loop in drop_slab_node (VM Functionality, bsc#1189301). - mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301). - mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes). - mtd: rawnand: cafe: Fix a resource leak in the error handling path of 'cafe_nand_probe()' (git-fixes). - nbd: Aovid double completion of a request (git-fixes). - nbd: do not update block size after device is started (git-fixes). - nbd: Fix NULL pointer in flush_workqueue (git-fixes). - nfs: Correct size calculation for create reply length (bsc#1189870). - nfsd4: Fix forced-expiry locking (git-fixes). - nfs: fix acl memory leak of posix_acl_create() (git-fixes). - nfsv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364). - nfsv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes). - NFSv4/pNFS: Fix a layoutget livelock loop (git-fixes). - nvme: avoid possible double fetch in handling CQE (bsc#1181972). - nvme: code command_id with a genctr for use-after-free validation (bsc#1181972). - nvme-multipath: revalidate paths during rescan (bsc#1187211) - nvme: only call synchronize_srcu when clearing current path (bsc#1188067). - nvme-pci: fix NULL req in completion handler (bsc#1181972). - nvme-pci: limit maximum queue depth to 4095 (bsc#1181972). - nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972). - nvme-pci: use unsigned for io queue depth (bsc#1181972). - nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972). - nvme-tcp: Do not reset transport on data digest errors (bsc#1188418). - nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384). - ocfs2: fix snprintf() checking (bsc#1189581). - ocfs2: fix zero out valid data (bsc#1189579). - ocfs2: initialize ip_next_orphan (bsc#1186731). - ocfs2: issue zeroout to EOF blocks (bsc#1189582). - ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439). - overflow: Correct check_shl_overflow() comment (git-fixes). - ovl: allow upperdir inside lowerdir (bsc#1189323). - ovl: expand warning in ovl_d_real() (bsc#1189323). - ovl: fix missing revert_creds() on error path (bsc#1189323). - ovl: perform vfs_getxattr() with mounter creds (bsc#1189323). - ovl: skip getxattr of security labels (bsc#1189323). - params: lift param_set_uint_minmax to common code (bsc#1181972). - PCI: Call Max Payload Size-related fixup quirks early (git-fixes). - PCI: Fix pci_dev_str_match_path() alloc while atomic bug (git-fixes). - PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes). - PCI: iproc: Fix BCMA probe resource handling (git-fixes). - PCI/MSI: Correct misleading comments (git-fixes). - PCI/MSI: Do not set invalid bits in MSI mask (git-fixes). - PCI/MSI: Enable and mask MSI-X early (git-fixes). - PCI/MSI: Enforce MSI[X] entry updates to be visible (git-fixes). - PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes). - PCI/MSI: Mask all unused MSI-X entries (git-fixes). - PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes). - PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes). - PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes). - PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes). - PCI/portdrv: Enable Bandwidth Notification only if port supports it (git-fixes). - PCI: Return ~0 data on pciconfig_read() CAP_SYS_ADMIN failure (git-fixes). - PCI: xilinx-nwl: Enable the clock through CCF (git-fixes). - pcmcia: i82092: fix a null pointer dereference bug (git-fixes). - pinctrl: samsung: Fix pinctrl bank pin count (git-fixes). - pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes). - pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes). - platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes). - powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes). - powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes). - powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906). - powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes). - powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes). - power: supply: max17042: handle fails of reading status register (git-fixes). - pwm: lpc32xx: Do not modify HW state in .probe() after the PWM chip was registered (git-fixes). - README: Modernize build instructions. - regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes). - regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes). - regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes). - reset: reset-zynqmp: Fixed the argument data type (git-fixes). - Revert 'ACPICA: Fix memory leak caused by _CID repair function' (git-fixes). - Revert 'dmaengine: imx-sdma: refine to load context only once' (git-fixes). - Revert 'gpio: eic-sprd: Use devm_platform_ioremap_resource()' (git-fixes). - Revert 'memcg: enable accounting for file lock caches (bsc#1190115).' - Revert 'mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711' (git-fixes). - Revert 'USB: serial: ch341: fix character loss at high transfer rates' (git-fixes). - rpm: Abolish image suffix (bsc#1189841). - rpm: Define $certs as rpm macro (bsc#1189841). - rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841). - rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305) - rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575). - rsi: fix an error code in rsi_probe() (git-fixes). - rsi: fix error code in rsi_load_9116_firmware() (git-fixes). - s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817). - s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771). - sched/fair: Correctly insert cfs_rq's to list on unthrottle (git-fixes) - sched/fair: Ensure that the CFS parent is added after unthrottling (git-fixes). - sched/rt: Fix RT utilization tracking during policy change (git-fixes) - scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970). - scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970). - scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970). - scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392). - scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650). - scsi: libfc: Fix array index out of bound exception (bsc#1188616). - scsi: lpfc: Add 256 Gb link speed support (bsc#1189385). - scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385). - scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385). - scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385). - scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385). - scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385). - scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385). - scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385). - scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385). - scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385). - scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385). - scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385). - scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385). - scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385). - scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385). - scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385). - scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385). - scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385). - scsi: lpfc: Improve firmware download logging (bsc#1189385). - scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385). - scsi: lpfc: Move initialization of phba->poll_list earlier to avoid crash (git-fixes). - scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385). - scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385). - scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385). - scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385). - scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385). - scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385). - scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385). - scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385). - scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385). - scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385). - scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385). - scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970). - scsi: mpt3sas: Fix ReplyPostFree pool allocation (bsc#1181006). - scsi: qla2xxx: Add heartbeat check (bsc#1189392). - scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392). - scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392). - scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392). - scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392). - scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392). - scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392). - scsi: qla2xxx: edif: Add key update (bsc#1189392). - scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392). - scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392). - scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392). - scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392). - scsi: qla2xxx: Fix spelling mistakes 'allloc' -> 'alloc' (bsc#1189392). - scsi: qla2xxx: Fix use after free in debug code (bsc#1189392). - scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392). - scsi: qla2xxx: Remove duplicate declarations (bsc#1189392). - scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392). - scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392). - scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392). - scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392). - scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392). - scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392). - scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392). - scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180). - scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770). - scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392). - scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes). - serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes). - serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes). - serial: tegra: Only print FIFO error message when an error occurs (git-fixes). - slimbus: messaging: check for valid transaction id (git-fixes). - slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes). - slimbus: ngd: reset dma setup during runtime pm (git-fixes). - soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes). - soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes). - soc: ixp4xx: fix printing resources (git-fixes). - soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes). - soc: qcom: rpmhpd: Use corner in power_off (git-fixes). - soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes). - spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes). - spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes). - spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes). - spi: mediatek: Fix fifo transfer (git-fixes). - spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes). - spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes). - spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes). - spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes). - spi: stm32h7: fix full duplex irq handler handling (git-fixes). - staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes). - staging: rtl8712: get rid of flush_scheduled_work (git-fixes). - staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes). - SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924). - SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924). - SUNRPC: Fix potential memory corruption (git-fixes). - SUNRPC: Fix the batch tasks count wraparound (git-fixes). - SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924). - SUNRPC: improve error response to over-size gss credential (bsc#1190022). - SUNRPC: Should wake up the privileged task firstly (git-fixes). - SUNRPC: Simplify socket shutdown when not reusing TCP ports (git-fixes). - thermal/drivers/exynos: Fix an error code in exynos_tmu_probe() (git-fixes). - tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes). - tracing / histogram: Give calculation hist_fields a size (git-fixes). - tracing: Reject string operand in the histogram expression (git-fixes). - tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes). - ubifs: Fix error return code in alloc_wbufs() (bsc#1189585). - ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583). - ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586). - ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455). - ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587). - Update patches.suse/ibmvnic-Allow-device-probe-if-the-device-is-not-read.patch (bsc#1167032 ltc#184087 bsc#1184114 ltc#192237). - usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes). - USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes). - usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes). - usb: dwc3: Add support for DWC_usb32 IP (git-fixes). - usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes). - usb: dwc3: core: Properly default unspecified speed (git-fixes). - usb: dwc3: debug: Remove newline printout (git-fixes). - usb: dwc3: Disable phy suspend after power-on reset (git-fixes). - usb: dwc3: gadget: Check MPS of the request length (git-fixes). - usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes). - usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes). - usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes). - usb: dwc3: gadget: Do not send unintended link state change (git-fixes). - usb: dwc3: gadget: Do not setup more than requested (git-fixes). - usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes). - usb: dwc3: gadget: Fix handling ZLP (git-fixes). - usb: dwc3: gadget: Give back staled requests (git-fixes). - usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes). - usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes). - usb: dwc3: gadget: Properly track pending and queued SG (git-fixes). - usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes). - usb: dwc3: gadget: Set BESL config parameter (git-fixes). - usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes). - usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes). - usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes). - usb: dwc3: meson-g12a: add IRQ check (git-fixes). - usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes). - usb: dwc3: of-simple: add a shutdown (git-fixes). - usb: dwc3: Separate field holding multiple properties (git-fixes). - usb: dwc3: st: Add of_dev_put() in probe function (git-fixes). - usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes). - usb: dwc3: Stop active transfers before halting the controller (git-fixes). - usb: dwc3: support continuous runtime PM with dual role (git-fixes). - usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes). - usb: dwc3: Use devres to get clocks (git-fixes). - USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes). - usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes). - usb: gadget: Export recommended BESL values (git-fixes). - usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes). - usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes). - usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes). - usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes). - usb: gadget: udc: at91: add IRQ check (git-fixes). - usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes). - usb: host: ohci-tmio: add IRQ check (git-fixes). - usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes). - usb: mtu3: fix the wrong HS mult value (git-fixes). - usb: mtu3: use @mult for HS isoc or intr (git-fixes). - usb: phy: fsl-usb: add IRQ check (git-fixes). - usb: phy: tahvo: add IRQ check (git-fixes). - usb: phy: twl6030: add IRQ checks (git-fixes). - USB: serial: ch341: fix character loss at high transfer rates (git-fixes). - USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes). - USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes). - USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes). - USB: usbtmc: Fix RCU stall warning (git-fixes). - virtio_pci: Support surprise removal of virtio pci device (git-fixes). - virt_wifi: fix error on connect (git-fixes). - VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes). - wireguard: allowedips: allocate nodes in kmem_cache (git-fixes). - wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes). - wireguard: allowedips: remove nodes in O(1) (git-fixes). - writeback: fix obtain a reference to a freeing memcg css (bsc#1189577). - x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489). - x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489). - x86/fpu: Reset state for all signal restore failures (bsc#1152489). - x86/kvm: fix vcpu-id indexed array sizes (git-fixes). - x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489). - xen/events: Fix race in set_evtchn_to_irq (git-fixes). - xprtrdma: Pad optimization, revisited (bsc#1189760). - usb: dwc2: Fix error path in gadget registration (git-fixes).
Patchnames
openSUSE-2021-1271
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).\n- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832 ).\n- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).\n- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).\n- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).\n- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).\n- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).\n- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).\n- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).\n- CVE-2021-3640: A Use-After-Free vulnerability in function sco_sock_sendmsg() was fixed (bnc#1188172).\n- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).\n- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).\n\nThe following non-security bugs were fixed:\n\n- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).\n- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)\n- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)\n- ACPI: processor: Export function to claim _CST control (bsc#1175543)\n- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)\n- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)\n- Add alt-commit for a BT fix patch (git-fixes)\n- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).\n- ALSA: hda - fix the \u0027Capture Switch\u0027 value change notifications (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).\n- ALSA: hda/realtek: Workaround for conflicting SSID on ASUS ROG Strix G17 (git-fixes).\n- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).\n- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum 800 (git-fixes).\n- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).\n- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).\n- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).\n- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).\n- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).\n- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).\n- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).\n- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).\n- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).\n- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).\n- ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes).\n- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).\n- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).\n- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).\n- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).\n- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).\n- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).\n- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).\n- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).\n- ath: Use safer key clearing with key cache entries (git-fixes).\n- bcma: Fix memory leak for internally-handled cores (git-fixes).\n- bdi: Do not use freezable workqueue (bsc#1189573).\n- blk-cgroup-kABI-fixes-for-new-fc_app_id-definition.patch\n- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).\n- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).\n- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).\n- blk-wbt: make sure throttle is enabled properly (bsc#1189504).\n- block: fix trace completion for chained bio (bsc#1189505).\n- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).\n- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).\n- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).\n- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).\n- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).\n- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).\n- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).\n- btrfs: add a comment explaining the data flush steps (bsc#1135481).\n- btrfs: add a trace class for dumping the current ENOSPC state (bsc#1135481).\n- btrfs: add a trace point for reserve tickets (bsc#1135481).\n- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).\n- btrfs: add flushing states for handling data reservations (bsc#1135481).\n- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).\n- btrfs: adjust the flush trace point to include the source (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).\n- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).\n- btrfs: check reclaim_size in need_preemptive_reclaim (bsc#1135481).\n- btrfs: check tickets after waiting on ordered extents (bsc#1135481).\n- btrfs: do async reclaim for data reservations (bsc#1135481).\n- btrfs: do not force commit if we are data (bsc#1135481).\n- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).\n- btrfs: fix btrfs_calc_reclaim_metadata_size calculation (bsc#1135481).\n- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).\n- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).\n- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).\n- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).\n- btrfs: implement space clamping for preemptive flushing (bsc#1135481).\n- btrfs: improve preemptive background space flushing (bsc#1135481).\n- btrfs: introduce a FORCE_COMMIT_TRANS flush operation (bsc#1135481).\n- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).\n- btrfs: make flush_space take a enum btrfs_flush_state instead of int (bsc#1135481).\n- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).\n- btrfs: remove FLUSH_DELAYED_REFS from data ENOSPC flushing (bsc#1135481).\n- btrfs: remove orig from shrink_delalloc (bsc#1135481).\n- btrfs: rename need_do_async_reclaim (bsc#1135481).\n- btrfs: rework btrfs_calc_reclaim_metadata_size (bsc#1135481).\n- btrfs: rip out btrfs_space_info::total_bytes_pinned (bsc#1135481).\n- btrfs: rip out may_commit_transaction (bsc#1135481).\n- btrfs: rip the first_ticket_bytes logic from fail_all_tickets (bsc#1135481).\n- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).\n- btrfs: serialize data reservations if we are flushing (bsc#1135481).\n- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).\n- btrfs: simplify the logic in need_preemptive_flushing (bsc#1135481).\n- btrfs: tracepoints: convert flush states to using EM macros (bsc#1135481).\n- btrfs: tracepoints: fix btrfs_trigger_flush symbolic string for flags (bsc#1135481).\n- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).\n- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).\n- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).\n- btrfs: use the same helper for data and metadata reservations (bsc#1135481).\n- btrfs: use ticketing for data space reservations (bsc#1135481).\n- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).\n- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).\n- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).\n- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).\n- cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181).\n- cgroup: verify that source is a string (bsc#1190131).\n- clk: kirkwood: Fix a clocking boot regression (git-fixes).\n- cpuidle: Allow idle states to be disabled by default (bsc#1175543)\n- cpuidle: Consolidate disabled state checks (bsc#1175543)\n- cpuidle: cpuidle_state kABI fix (bsc#1175543)\n- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)\n- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)\n- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)\n- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).\n- crypto: qat - use proper type for vf_mask (git-fixes).\n- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).\n- dmaengine: acpi: Avoid comparison GSI with Linux vIRQ (git-fixes).\n- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).\n- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).\n- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).\n- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).\n- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).\n- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).\n- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).\n- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).\n- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)\n- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).\n- drm/amdgpu/acp: Make PM domain really work (git-fixes).\n- drm: Copy drm_wait_vblank to user before returning (git-fixes).\n- drm/msi/mdp4: populate priv-\u003ekms in mdp4_kms_init (git-fixes).\n- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).\n- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).\n- drm/nouveau/disp: power down unused DP links during init (git-fixes).\n- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).\n- drm/panfrost: Simplify lock_region calculation (git-fixes).\n- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).\n- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).\n- ext4: fix avefreec in find_group_orlov (bsc#1189566).\n- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).\n- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).\n- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).\n- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).\n- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).\n- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).\n- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).\n- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).\n- Fix breakage of swap over NFS (bsc#1188924).\n- Fix kabi of prepare_to_wait_exclusive() (bsc#1189575).\n- fixup \u0027rpm: support gz and zst compression methods\u0027 \n- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).\n- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).\n- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).\n- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).\n- gpio: mpc8xxx: Fix a resources leak in the error handling path of \u0027mpc8xxx_probe()\u0027 (git-fixes).\n- gpu: ipu-v3: Fix i.MX IPU-v3 offset calculations for (semi)planar U/V formats (git-fixes).\n- HID: i2c-hid: Fix Elan touchpad regression (git-fixes).\n- HID: input: do not report stylus battery state as \u0027full\u0027 (git-fixes).\n- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).\n- i2c: highlander: add IRQ check (git-fixes).\n- i2c: iop3xx: fix deferred probing (git-fixes).\n- i2c: mt65xx: fix IRQ check (git-fixes).\n- i2c: s3c2410: fix IRQ check (git-fixes).\n- iio: adc: Fix incorrect exit of for-loop (git-fixes).\n- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).\n- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).\n- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)\n- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)\n- intel_idle: Annotate init time data structures (bsc#1175543) \n- intel_idle: Customize IceLake server support (bsc#1175543)\n- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)\n- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)\n- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)\n- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)\n- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)\n- intel_idle: Use ACPI _CST on server systems (bsc#1175543)\n- iommu/amd: Fix extended features logging (bsc#1189213).\n- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).\n- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).\n- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).\n- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).\n- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).\n- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).\n- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).\n- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).\n- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).\n- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).\n- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).\n- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).\n- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).\n- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).\n- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).\n- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).\n- kABI fix of usb_dcd_config_params (git-fixes).\n- kernel-binary.spec: Define $image as rpm macro (bsc#1189841).\n- kernel-cert-subpackage: Fix certificate location in scriptlets (bsc#1189841).\n- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).\n- leds: trigger: audio: Add an activate callback to ensure the initial brightness is set (git-fixes).\n- libata: add ATA_HORKAGE_NO_NCQ_TRIM for Samsung 860 and 870 SSDs (git-fixes).\n- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).\n- lib/mpi: use kcalloc in mpi_resize (git-fixes).\n- lockd: Fix invalid lockowner cast after vfs_test_lock (git-fixes).\n- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).\n- mailbox: sti: quieten kernel-doc warnings (git-fixes).\n- md/raid10: properly indicate failure when ending a failed write request (git-fixes).\n- media: cxd2880-spi: Fix an error handling path (git-fixes).\n- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).\n- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).\n- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).\n- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).\n- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).\n- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).\n- media: go7007: remove redundant initialization (git-fixes).\n- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).\n- media: TDA1997x: enable EDID support (git-fixes).\n- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).\n- media: zr364xx: fix memory leaks in probe() (git-fixes).\n- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).\n- memcg: enable accounting for file lock caches (bsc#1190115).\n- mfd: axp20x: Update AXP288 volatile ranges (git-fixes).\n- mfd: lpc_sch: Rename GPIOBASE to prevent build error (git-fixes).\n- mfd: tqmx86: Clear GPIO IRQ resource when no IRQ is set (git-fixes).\n- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).\n- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).\n- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).\n- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).\n- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).\n- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).\n- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).\n- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).\n- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).\n- mm/vmscan: fix infinite loop in drop_slab_node (VM Functionality, bsc#1189301).\n- mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301).\n- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).\n- mtd: rawnand: cafe: Fix a resource leak in the error handling path of \u0027cafe_nand_probe()\u0027 (git-fixes).\n- nbd: Aovid double completion of a request (git-fixes).\n- nbd: do not update block size after device is started (git-fixes).\n- nbd: Fix NULL pointer in flush_workqueue (git-fixes).\n- nfs: Correct size calculation for create reply length (bsc#1189870).\n- nfsd4: Fix forced-expiry locking (git-fixes).\n- nfs: fix acl memory leak of posix_acl_create() (git-fixes).\n- nfsv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).\n- nfsv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).\n- NFSv4/pNFS: Fix a layoutget livelock loop (git-fixes).\n- nvme: avoid possible double fetch in handling CQE (bsc#1181972).\n- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).\n- nvme-multipath: revalidate paths during rescan (bsc#1187211)\n- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).\n- nvme-pci: fix NULL req in completion handler (bsc#1181972).\n- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).\n- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).\n- nvme-pci: use unsigned for io queue depth (bsc#1181972).\n- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).\n- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).\n- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).\n- ocfs2: fix snprintf() checking (bsc#1189581).\n- ocfs2: fix zero out valid data (bsc#1189579).\n- ocfs2: initialize ip_next_orphan (bsc#1186731).\n- ocfs2: issue zeroout to EOF blocks (bsc#1189582).\n- ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439).\n- overflow: Correct check_shl_overflow() comment (git-fixes).\n- ovl: allow upperdir inside lowerdir (bsc#1189323).\n- ovl: expand warning in ovl_d_real() (bsc#1189323).\n- ovl: fix missing revert_creds() on error path (bsc#1189323).\n- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).\n- ovl: skip getxattr of security labels (bsc#1189323).\n- params: lift param_set_uint_minmax to common code (bsc#1181972).\n- PCI: Call Max Payload Size-related fixup quirks early (git-fixes).\n- PCI: Fix pci_dev_str_match_path() alloc while atomic bug (git-fixes).\n- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).\n- PCI: iproc: Fix BCMA probe resource handling (git-fixes).\n- PCI/MSI: Correct misleading comments (git-fixes).\n- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).\n- PCI/MSI: Enable and mask MSI-X early (git-fixes).\n- PCI/MSI: Enforce MSI[X] entry updates to be visible (git-fixes).\n- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).\n- PCI/MSI: Mask all unused MSI-X entries (git-fixes).\n- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).\n- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).\n- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).\n- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).\n- PCI/portdrv: Enable Bandwidth Notification only if port supports it (git-fixes).\n- PCI: Return ~0 data on pciconfig_read() CAP_SYS_ADMIN failure (git-fixes).\n- PCI: xilinx-nwl: Enable the clock through CCF (git-fixes).\n- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).\n- pinctrl: samsung: Fix pinctrl bank pin count (git-fixes).\n- pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes).\n- pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes).\n- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).\n- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).\n- powerpc/papr_scm: Make \u0027perf_stats\u0027 invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).\n- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).\n- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes).\n- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes).\n- power: supply: max17042: handle fails of reading status register (git-fixes).\n- pwm: lpc32xx: Do not modify HW state in .probe() after the PWM chip was registered (git-fixes).\n- README: Modernize build instructions.\n- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).\n- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).\n- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).\n- reset: reset-zynqmp: Fixed the argument data type (git-fixes).\n- Revert \u0027ACPICA: Fix memory leak caused by _CID repair function\u0027 (git-fixes).\n- Revert \u0027dmaengine: imx-sdma: refine to load context only once\u0027 (git-fixes).\n- Revert \u0027gpio: eic-sprd: Use devm_platform_ioremap_resource()\u0027 (git-fixes).\n- Revert \u0027memcg: enable accounting for file lock caches (bsc#1190115).\u0027\n- Revert \u0027mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711\u0027 (git-fixes).\n- Revert \u0027USB: serial: ch341: fix character loss at high transfer rates\u0027 (git-fixes).\n- rpm: Abolish image suffix (bsc#1189841).\n- rpm: Define $certs as rpm macro (bsc#1189841).\n- rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841).\n- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)\n- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).\n- rsi: fix an error code in rsi_probe() (git-fixes).\n- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).\n- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).\n- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).\n- sched/fair: Correctly insert cfs_rq\u0027s to list on unthrottle (git-fixes)\n- sched/fair: Ensure that the CFS parent is added after unthrottling (git-fixes).\n- sched/rt: Fix RT utilization tracking during policy change (git-fixes)\n- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).\n- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).\n- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).\n- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).\n- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).\n- scsi: libfc: Fix array index out of bound exception (bsc#1188616).\n- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).\n- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).\n- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).\n- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).\n- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).\n- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).\n- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).\n- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).\n- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).\n- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).\n- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).\n- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).\n- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).\n- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).\n- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).\n- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).\n- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).\n- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).\n- scsi: lpfc: Improve firmware download logging (bsc#1189385).\n- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).\n- scsi: lpfc: Move initialization of phba-\u003epoll_list earlier to avoid crash (git-fixes).\n- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).\n- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).\n- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).\n- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).\n- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).\n- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).\n- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).\n- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).\n- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).\n- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).\n- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).\n- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).\n- scsi: mpt3sas: Fix ReplyPostFree pool allocation (bsc#1181006).\n- scsi: qla2xxx: Add heartbeat check (bsc#1189392).\n- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).\n- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).\n- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).\n- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).\n- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).\n- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).\n- scsi: qla2xxx: edif: Add key update (bsc#1189392).\n- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).\n- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).\n- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).\n- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).\n- scsi: qla2xxx: Fix spelling mistakes \u0027allloc\u0027 -\u003e \u0027alloc\u0027 (bsc#1189392).\n- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).\n- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).\n- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).\n- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).\n- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).\n- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).\n- scsi: qla2xxx: Remove unused variable \u0027status\u0027 (bsc#1189392).\n- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).\n- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).\n- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).\n- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).\n- scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).\n- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).\n- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).\n- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).\n- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).\n- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).\n- slimbus: messaging: check for valid transaction id (git-fixes).\n- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).\n- slimbus: ngd: reset dma setup during runtime pm (git-fixes).\n- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).\n- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).\n- soc: ixp4xx: fix printing resources (git-fixes).\n- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).\n- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).\n- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).\n- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).\n- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).\n- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).\n- spi: mediatek: Fix fifo transfer (git-fixes).\n- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).\n- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).\n- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).\n- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).\n- spi: stm32h7: fix full duplex irq handler handling (git-fixes).\n- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).\n- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).\n- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).\n- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).\n- SUNRPC: \u0027Directory with parent \u0027rpc_clnt\u0027 already present!\u0027 (bsc#1168202 bsc#1188924).\n- SUNRPC: Fix potential memory corruption (git-fixes).\n- SUNRPC: Fix the batch tasks count wraparound (git-fixes).\n- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).\n- SUNRPC: improve error response to over-size gss credential (bsc#1190022).\n- SUNRPC: Should wake up the privileged task firstly (git-fixes).\n- SUNRPC: Simplify socket shutdown when not reusing TCP ports (git-fixes).\n- thermal/drivers/exynos: Fix an error code in exynos_tmu_probe() (git-fixes).\n- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).\n- tracing / histogram: Give calculation hist_fields a size (git-fixes).\n- tracing: Reject string operand in the histogram expression (git-fixes).\n- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).\n- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).\n- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).\n- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).\n- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).\n- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).\n- Update patches.suse/ibmvnic-Allow-device-probe-if-the-device-is-not-read.patch (bsc#1167032 ltc#184087 bsc#1184114 ltc#192237).\n- usb: bdc: Fix an error handling path in \u0027bdc_probe()\u0027 when no suitable DMA config is available (git-fixes).\n- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).\n- usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes).\n- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).\n- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).\n- usb: dwc3: core: Properly default unspecified speed (git-fixes).\n- usb: dwc3: debug: Remove newline printout (git-fixes).\n- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).\n- usb: dwc3: gadget: Check MPS of the request length (git-fixes).\n- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).\n- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).\n- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).\n- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).\n- usb: dwc3: gadget: Do not setup more than requested (git-fixes).\n- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).\n- usb: dwc3: gadget: Fix handling ZLP (git-fixes).\n- usb: dwc3: gadget: Give back staled requests (git-fixes).\n- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).\n- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).\n- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).\n- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).\n- usb: dwc3: gadget: Set BESL config parameter (git-fixes).\n- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).\n- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).\n- usb: dwc3: gadget: Workaround Mirosoft\u0027s BESL check (git-fixes).\n- usb: dwc3: meson-g12a: add IRQ check (git-fixes).\n- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).\n- usb: dwc3: of-simple: add a shutdown (git-fixes).\n- usb: dwc3: Separate field holding multiple properties (git-fixes).\n- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).\n- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).\n- usb: dwc3: Stop active transfers before halting the controller (git-fixes).\n- usb: dwc3: support continuous runtime PM with dual role (git-fixes).\n- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).\n- usb: dwc3: Use devres to get clocks (git-fixes).\n- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).\n- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).\n- usb: gadget: Export recommended BESL values (git-fixes).\n- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).\n- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).\n- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).\n- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).\n- usb: gadget: udc: at91: add IRQ check (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).\n- usb: host: ohci-tmio: add IRQ check (git-fixes).\n- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).\n- usb: mtu3: fix the wrong HS mult value (git-fixes).\n- usb: mtu3: use @mult for HS isoc or intr (git-fixes).\n- usb: phy: fsl-usb: add IRQ check (git-fixes).\n- usb: phy: tahvo: add IRQ check (git-fixes).\n- usb: phy: twl6030: add IRQ checks (git-fixes).\n- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).\n- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).\n- USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes).\n- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).\n- USB: usbtmc: Fix RCU stall warning (git-fixes).\n- virtio_pci: Support surprise removal of virtio pci device (git-fixes).\n- virt_wifi: fix error on connect (git-fixes).\n- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).\n- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).\n- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).\n- wireguard: allowedips: remove nodes in O(1) (git-fixes).\n- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).\n- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).\n- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).\n- x86/fpu: Reset state for all signal restore failures (bsc#1152489).\n- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).\n- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).\n- xen/events: Fix race in set_evtchn_to_irq (git-fixes).\n- xprtrdma: Pad optimization, revisited (bsc#1189760).\n- usb: dwc2: Fix error path in gadget registration (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2021-1271",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1271-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2021:1271-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2021:1271-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1040364",
        "url": "https://bugzilla.suse.com/1040364"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1124431",
        "url": "https://bugzilla.suse.com/1124431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127650",
        "url": "https://bugzilla.suse.com/1127650"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1135481",
        "url": "https://bugzilla.suse.com/1135481"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152489",
        "url": "https://bugzilla.suse.com/1152489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160010",
        "url": "https://bugzilla.suse.com/1160010"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167032",
        "url": "https://bugzilla.suse.com/1167032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168202",
        "url": "https://bugzilla.suse.com/1168202"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171420",
        "url": "https://bugzilla.suse.com/1171420"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174969",
        "url": "https://bugzilla.suse.com/1174969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175052",
        "url": "https://bugzilla.suse.com/1175052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175543",
        "url": "https://bugzilla.suse.com/1175543"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177399",
        "url": "https://bugzilla.suse.com/1177399"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180141",
        "url": "https://bugzilla.suse.com/1180141"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180347",
        "url": "https://bugzilla.suse.com/1180347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181006",
        "url": "https://bugzilla.suse.com/1181006"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181148",
        "url": "https://bugzilla.suse.com/1181148"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181972",
        "url": "https://bugzilla.suse.com/1181972"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184114",
        "url": "https://bugzilla.suse.com/1184114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184180",
        "url": "https://bugzilla.suse.com/1184180"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185675",
        "url": "https://bugzilla.suse.com/1185675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186731",
        "url": "https://bugzilla.suse.com/1186731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187211",
        "url": "https://bugzilla.suse.com/1187211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187455",
        "url": "https://bugzilla.suse.com/1187455"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187468",
        "url": "https://bugzilla.suse.com/1187468"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187619",
        "url": "https://bugzilla.suse.com/1187619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188067",
        "url": "https://bugzilla.suse.com/1188067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188172",
        "url": "https://bugzilla.suse.com/1188172"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188418",
        "url": "https://bugzilla.suse.com/1188418"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188439",
        "url": "https://bugzilla.suse.com/1188439"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188616",
        "url": "https://bugzilla.suse.com/1188616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188878",
        "url": "https://bugzilla.suse.com/1188878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188924",
        "url": "https://bugzilla.suse.com/1188924"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188982",
        "url": "https://bugzilla.suse.com/1188982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188983",
        "url": "https://bugzilla.suse.com/1188983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188985",
        "url": "https://bugzilla.suse.com/1188985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189153",
        "url": "https://bugzilla.suse.com/1189153"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189197",
        "url": "https://bugzilla.suse.com/1189197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189209",
        "url": "https://bugzilla.suse.com/1189209"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189210",
        "url": "https://bugzilla.suse.com/1189210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189212",
        "url": "https://bugzilla.suse.com/1189212"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189213",
        "url": "https://bugzilla.suse.com/1189213"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189214",
        "url": "https://bugzilla.suse.com/1189214"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189215",
        "url": "https://bugzilla.suse.com/1189215"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189216",
        "url": "https://bugzilla.suse.com/1189216"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189217",
        "url": "https://bugzilla.suse.com/1189217"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189218",
        "url": "https://bugzilla.suse.com/1189218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189219",
        "url": "https://bugzilla.suse.com/1189219"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189220",
        "url": "https://bugzilla.suse.com/1189220"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189221",
        "url": "https://bugzilla.suse.com/1189221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189222",
        "url": "https://bugzilla.suse.com/1189222"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189229",
        "url": "https://bugzilla.suse.com/1189229"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189262",
        "url": "https://bugzilla.suse.com/1189262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189291",
        "url": "https://bugzilla.suse.com/1189291"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189292",
        "url": "https://bugzilla.suse.com/1189292"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189298",
        "url": "https://bugzilla.suse.com/1189298"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189301",
        "url": "https://bugzilla.suse.com/1189301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189305",
        "url": "https://bugzilla.suse.com/1189305"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189323",
        "url": "https://bugzilla.suse.com/1189323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189384",
        "url": "https://bugzilla.suse.com/1189384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189385",
        "url": "https://bugzilla.suse.com/1189385"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189392",
        "url": "https://bugzilla.suse.com/1189392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189399",
        "url": "https://bugzilla.suse.com/1189399"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189400",
        "url": "https://bugzilla.suse.com/1189400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189427",
        "url": "https://bugzilla.suse.com/1189427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189449",
        "url": "https://bugzilla.suse.com/1189449"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189503",
        "url": "https://bugzilla.suse.com/1189503"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189504",
        "url": "https://bugzilla.suse.com/1189504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189505",
        "url": "https://bugzilla.suse.com/1189505"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189506",
        "url": "https://bugzilla.suse.com/1189506"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189507",
        "url": "https://bugzilla.suse.com/1189507"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189562",
        "url": "https://bugzilla.suse.com/1189562"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189563",
        "url": "https://bugzilla.suse.com/1189563"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189564",
        "url": "https://bugzilla.suse.com/1189564"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189565",
        "url": "https://bugzilla.suse.com/1189565"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189566",
        "url": "https://bugzilla.suse.com/1189566"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189567",
        "url": "https://bugzilla.suse.com/1189567"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189568",
        "url": "https://bugzilla.suse.com/1189568"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189569",
        "url": "https://bugzilla.suse.com/1189569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189573",
        "url": "https://bugzilla.suse.com/1189573"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189574",
        "url": "https://bugzilla.suse.com/1189574"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189575",
        "url": "https://bugzilla.suse.com/1189575"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189576",
        "url": "https://bugzilla.suse.com/1189576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189577",
        "url": "https://bugzilla.suse.com/1189577"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189579",
        "url": "https://bugzilla.suse.com/1189579"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189581",
        "url": "https://bugzilla.suse.com/1189581"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189582",
        "url": "https://bugzilla.suse.com/1189582"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189583",
        "url": "https://bugzilla.suse.com/1189583"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189585",
        "url": "https://bugzilla.suse.com/1189585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189586",
        "url": "https://bugzilla.suse.com/1189586"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189587",
        "url": "https://bugzilla.suse.com/1189587"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189706",
        "url": "https://bugzilla.suse.com/1189706"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189760",
        "url": "https://bugzilla.suse.com/1189760"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189832",
        "url": "https://bugzilla.suse.com/1189832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189841",
        "url": "https://bugzilla.suse.com/1189841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189870",
        "url": "https://bugzilla.suse.com/1189870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189883",
        "url": "https://bugzilla.suse.com/1189883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190022",
        "url": "https://bugzilla.suse.com/1190022"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190025",
        "url": "https://bugzilla.suse.com/1190025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190115",
        "url": "https://bugzilla.suse.com/1190115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190117",
        "url": "https://bugzilla.suse.com/1190117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190131",
        "url": "https://bugzilla.suse.com/1190131"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190181",
        "url": "https://bugzilla.suse.com/1190181"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190358",
        "url": "https://bugzilla.suse.com/1190358"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190412",
        "url": "https://bugzilla.suse.com/1190412"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190428",
        "url": "https://bugzilla.suse.com/1190428"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34556 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34556/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-35477 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-35477/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3640 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3653 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3656 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3732 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3739 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3739/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3743 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3743/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3753 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3759 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38160 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38198 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38204 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38205 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38205/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38207 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38207/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-09-15T14:35:16Z",
      "generator": {
        "date": "2021-09-15T14:35:16Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2021:1271-1",
      "initial_release_date": "2021-09-15T14:35:16Z",
      "revision_history": [
        {
          "date": "2021-09-15T14:35:16Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.3.18-lp152.92.2.noarch",
                "product": {
                  "name": "kernel-devel-5.3.18-lp152.92.2.noarch",
                  "product_id": "kernel-devel-5.3.18-lp152.92.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-5.3.18-lp152.92.1.noarch",
                "product": {
                  "name": "kernel-docs-5.3.18-lp152.92.1.noarch",
                  "product_id": "kernel-docs-5.3.18-lp152.92.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-5.3.18-lp152.92.1.noarch",
                "product": {
                  "name": "kernel-docs-html-5.3.18-lp152.92.1.noarch",
                  "product_id": "kernel-docs-html-5.3.18-lp152.92.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.3.18-lp152.92.2.noarch",
                "product": {
                  "name": "kernel-macros-5.3.18-lp152.92.2.noarch",
                  "product_id": "kernel-macros-5.3.18-lp152.92.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.3.18-lp152.92.2.noarch",
                "product": {
                  "name": "kernel-source-5.3.18-lp152.92.2.noarch",
                  "product_id": "kernel-source-5.3.18-lp152.92.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
                "product": {
                  "name": "kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
                  "product_id": "kernel-source-vanilla-5.3.18-lp152.92.2.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-5.3.18-lp152.92.2.x86_64",
                "product": {
                  "name": "kernel-debug-5.3.18-lp152.92.2.x86_64",
                  "product_id": "kernel-debug-5.3.18-lp152.92.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
                "product": {
                  "name": "kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
                  "product_id": "kernel-debug-devel-5.3.18-lp152.92.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-lp152.92.2.x86_64",
                "product": {
                  "name": "kernel-default-5.3.18-lp152.92.2.x86_64",
                  "product_id": "kernel-default-5.3.18-lp152.92.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
                "product": {
                  "name": "kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
                  "product_id": "kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
                  "product_id": "kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-lp152.92.2.x86_64",
                "product": {
                  "name": "kernel-default-devel-5.3.18-lp152.92.2.x86_64",
                  "product_id": "kernel-default-devel-5.3.18-lp152.92.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
                  "product_id": "kernel-kvmsmall-5.3.18-lp152.92.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
                  "product_id": "kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-lp152.92.2.x86_64",
                "product": {
                  "name": "kernel-obs-build-5.3.18-lp152.92.2.x86_64",
                  "product_id": "kernel-obs-build-5.3.18-lp152.92.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
                  "product_id": "kernel-obs-qa-5.3.18-lp152.92.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-5.3.18-lp152.92.2.x86_64",
                "product": {
                  "name": "kernel-preempt-5.3.18-lp152.92.2.x86_64",
                  "product_id": "kernel-preempt-5.3.18-lp152.92.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
                "product": {
                  "name": "kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
                  "product_id": "kernel-preempt-devel-5.3.18-lp152.92.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-lp152.92.1.x86_64",
                "product": {
                  "name": "kernel-syms-5.3.18-lp152.92.1.x86_64",
                  "product_id": "kernel-syms-5.3.18-lp152.92.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.2",
                "product": {
                  "name": "openSUSE Leap 15.2",
                  "product_id": "openSUSE Leap 15.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-5.3.18-lp152.92.2.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64"
        },
        "product_reference": "kernel-debug-5.3.18-lp152.92.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-5.3.18-lp152.92.2.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64"
        },
        "product_reference": "kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-lp152.92.2.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-lp152.92.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64"
        },
        "product_reference": "kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-lp152.92.2.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-lp152.92.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-lp152.92.2.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-lp152.92.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-lp152.92.1.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-lp152.92.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-html-5.3.18-lp152.92.1.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch"
        },
        "product_reference": "kernel-docs-html-5.3.18-lp152.92.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-5.3.18-lp152.92.2.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64"
        },
        "product_reference": "kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64"
        },
        "product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-lp152.92.2.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-lp152.92.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-lp152.92.2.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-lp152.92.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.3.18-lp152.92.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64"
        },
        "product_reference": "kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-lp152.92.2.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-lp152.92.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-lp152.92.2.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-lp152.92.2.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch"
        },
        "product_reference": "kernel-source-5.3.18-lp152.92.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-5.3.18-lp152.92.2.noarch as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch"
        },
        "product_reference": "kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-lp152.92.1.x86_64 as component of openSUSE Leap 15.2",
          "product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-lp152.92.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-34556",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34556"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34556",
          "url": "https://www.suse.com/security/cve/CVE-2021-34556"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188983 for CVE-2021-34556",
          "url": "https://bugzilla.suse.com/1188983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-34556"
    },
    {
      "cve": "CVE-2021-35477",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-35477"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-35477",
          "url": "https://www.suse.com/security/cve/CVE-2021-35477"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188985 for CVE-2021-35477",
          "url": "https://bugzilla.suse.com/1188985"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-35477"
    },
    {
      "cve": "CVE-2021-3640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3640",
          "url": "https://www.suse.com/security/cve/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188172 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188613 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191530 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1191530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3640"
    },
    {
      "cve": "CVE-2021-3653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3653",
          "url": "https://www.suse.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189399 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189399"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189420 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189420"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3653"
    },
    {
      "cve": "CVE-2021-3656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3656",
          "url": "https://www.suse.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189400 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189400"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189418 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189418"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3656"
    },
    {
      "cve": "CVE-2021-3732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3732",
          "url": "https://www.suse.com/security/cve/CVE-2021-3732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189706 for CVE-2021-3732",
          "url": "https://bugzilla.suse.com/1189706"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3732"
    },
    {
      "cve": "CVE-2021-3739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires \u0027CAP_SYS_ADMIN\u0027. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3739",
          "url": "https://www.suse.com/security/cve/CVE-2021-3739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189832 for CVE-2021-3739",
          "url": "https://bugzilla.suse.com/1189832"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3739"
    },
    {
      "cve": "CVE-2021-3743",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3743"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3743",
          "url": "https://www.suse.com/security/cve/CVE-2021-3743"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189883 for CVE-2021-3743",
          "url": "https://bugzilla.suse.com/1189883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3743"
    },
    {
      "cve": "CVE-2021-3753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3753",
          "url": "https://www.suse.com/security/cve/CVE-2021-3753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190025 for CVE-2021-3753",
          "url": "https://bugzilla.suse.com/1190025"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3753"
    },
    {
      "cve": "CVE-2021-3759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3759",
          "url": "https://www.suse.com/security/cve/CVE-2021-3759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190115 for CVE-2021-3759",
          "url": "https://bugzilla.suse.com/1190115"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3759"
    },
    {
      "cve": "CVE-2021-38160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38160",
          "url": "https://www.suse.com/security/cve/CVE-2021-38160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190117 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190118 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38160"
    },
    {
      "cve": "CVE-2021-38198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38198",
          "url": "https://www.suse.com/security/cve/CVE-2021-38198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189262 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189278 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189278"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-38198"
    },
    {
      "cve": "CVE-2021-38204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38204",
          "url": "https://www.suse.com/security/cve/CVE-2021-38204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189291 for CVE-2021-38204",
          "url": "https://bugzilla.suse.com/1189291"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38204"
    },
    {
      "cve": "CVE-2021-38205",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38205"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38205",
          "url": "https://www.suse.com/security/cve/CVE-2021-38205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189292 for CVE-2021-38205",
          "url": "https://bugzilla.suse.com/1189292"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-38205"
    },
    {
      "cve": "CVE-2021-38207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
          "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
          "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
          "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
          "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38207",
          "url": "https://www.suse.com/security/cve/CVE-2021-38207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189298 for CVE-2021-38207",
          "url": "https://bugzilla.suse.com/1189298"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.92.2.lp152.8.42.3.x86_64",
            "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.92.1.noarch",
            "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.92.1.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.92.2.x86_64",
            "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.92.2.noarch",
            "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.92.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-15T14:35:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38207"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.